We research. You level up.
Hacking with AWS: incorporating leaky buckets into your OSINT workflow
September 13, 2019 - When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.
DEF CON 27 retrospective: badge life redux
August 20, 2019 - Learn about one of our researcher's badge experiences at DEF CON 27.
Caution: Misuse of security tools can turn against you
July 11, 2019 - If not implemented correctly, the very security tools we use to keep our information private may actually cause data leaks themselves. We outline a few cases and provide suggestions for researchers and security admins.
Write for Labs
Select your language
Your intro to everything relating to cyberthreats, and how to stop them.